
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Spam detection on social networks using deep contextualized word representation
Razan Ghanem, Hasan Erbay
Multimedia Tools and Applications (2022) Vol. 82, Iss. 3, pp. 3697-3712
Closed Access | Times Cited: 25
Razan Ghanem, Hasan Erbay
Multimedia Tools and Applications (2022) Vol. 82, Iss. 3, pp. 3697-3712
Closed Access | Times Cited: 25
Showing 25 citing articles:
Large language models (LLMs): survey, technical frameworks, and future challenges
Pranjal Kumar
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 20
Pranjal Kumar
Artificial Intelligence Review (2024) Vol. 57, Iss. 10
Open Access | Times Cited: 20
VoteDroid: a new ensemble voting classifier for malware detection based on fine-tuned deep learning models
Halit Bakır
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 10
Halit Bakır
Multimedia Tools and Applications (2024)
Open Access | Times Cited: 10
Empirical Enhancement of Intrusion Detection Systems: A Comprehensive Approach with Genetic Algorithm-based Hyperparameter Tuning and Hybrid Feature Selection
Halit Bakır, Özlem Ceviz
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 13025-13043
Open Access | Times Cited: 6
Halit Bakır, Özlem Ceviz
Arabian Journal for Science and Engineering (2024) Vol. 49, Iss. 9, pp. 13025-13043
Open Access | Times Cited: 6
Swift Detection of XSS Attacks: Enhancing XSS Attack Detection by Leveraging Hybrid Semantic Embeddings and AI Techniques
Rezan Bakır, Halit Bakır
Arabian Journal for Science and Engineering (2024)
Open Access | Times Cited: 6
Rezan Bakır, Halit Bakır
Arabian Journal for Science and Engineering (2024)
Open Access | Times Cited: 6
Detection of Fake Profiles on Online Social Network Platforms: Performance Evaluation of Artificial Intelligence Techniques
Akash Shah, Sapna Varshney, Monica Mehrotra
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 5
Akash Shah, Sapna Varshney, Monica Mehrotra
SN Computer Science (2024) Vol. 5, Iss. 5
Closed Access | Times Cited: 5
UniEmbed: A Novel Approach to Detect XSS and SQL Injection Attacks Leveraging Multiple Feature Fusion with Machine Learning Techniques
Razan Ghanem
Arabian Journal for Science and Engineering (2025)
Open Access
Razan Ghanem
Arabian Journal for Science and Engineering (2025)
Open Access
Fake News Detection Using BERT and Bi-LSTM with Grid Search Hyperparameter Optimization
Muhammet Tan, Halit Bakır
Bilişim Teknolojileri Dergisi (2025) Vol. 18, Iss. 1, pp. 11-28
Open Access
Muhammet Tan, Halit Bakır
Bilişim Teknolojileri Dergisi (2025) Vol. 18, Iss. 1, pp. 11-28
Open Access
Advanced Android Malware Detection: Merging Deep Learning and XGBoost Techniques
Esra Kavalcı Yılmaz, Razan Ghanem
Bilişim Teknolojileri Dergisi (2025) Vol. 18, Iss. 1, pp. 45-61
Open Access
Esra Kavalcı Yılmaz, Razan Ghanem
Bilişim Teknolojileri Dergisi (2025) Vol. 18, Iss. 1, pp. 45-61
Open Access
Detection of Twitter Spam Using GLoVe Vocabulary Features, Bidirectional LSTM and Convolution Neural Network
Pinnapureddy Manasa, Arun Malik, Isha Batra
SN Computer Science (2024) Vol. 5, Iss. 2
Closed Access | Times Cited: 4
Pinnapureddy Manasa, Arun Malik, Isha Batra
SN Computer Science (2024) Vol. 5, Iss. 2
Closed Access | Times Cited: 4
A semantic-based model with a hybrid feature engineering process for accurate spam detection
Chira N. Mohammed, Ayah M. Ahmed
Journal of Electrical Systems and Information Technology (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 3
Chira N. Mohammed, Ayah M. Ahmed
Journal of Electrical Systems and Information Technology (2024) Vol. 11, Iss. 1
Open Access | Times Cited: 3
DSpamOnto: An Ontology Modelling for Domain-Specific Social Spammers in Microblogging
Malak Al-Hassan, Bilal Abu-Salih, Ahmad Al Hwaitat
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 109-109
Open Access | Times Cited: 7
Malak Al-Hassan, Bilal Abu-Salih, Ahmad Al Hwaitat
Big Data and Cognitive Computing (2023) Vol. 7, Iss. 2, pp. 109-109
Open Access | Times Cited: 7
ALBERT4Spam: A Novel Approach for Spam Detection on Social Networks
Razan Ghanem, Hasan Erbay, Halit Bakır
Bilişim Teknolojileri Dergisi (2024) Vol. 17, Iss. 2, pp. 81-94
Open Access | Times Cited: 2
Razan Ghanem, Hasan Erbay, Halit Bakır
Bilişim Teknolojileri Dergisi (2024) Vol. 17, Iss. 2, pp. 81-94
Open Access | Times Cited: 2
Unsupervised Anomaly Detection on Attributed Networks With Graph Contrastive Learning for Consumer Electronics Security
Bo Xu, J. Wang, Zhehuan Zhao, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4062-4072
Closed Access | Times Cited: 1
Bo Xu, J. Wang, Zhehuan Zhao, et al.
IEEE Transactions on Consumer Electronics (2024) Vol. 70, Iss. 1, pp. 4062-4072
Closed Access | Times Cited: 1
An Efficient Mechanism of Modified Sand Cat Swarm Optimization and DCNN For Detection of Spam In Online Social Media Network
Neomi Nelin Nicholas, V. Nirmalrani
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Neomi Nelin Nicholas, V. Nirmalrani
Research Square (Research Square) (2024)
Open Access | Times Cited: 1
Reflection of people’s professions on social media platforms
Ömer Dağıstanlı, Hasan Erbay, Hakan Kör, et al.
Neural Computing and Applications (2022) Vol. 35, Iss. 7, pp. 5575-5586
Closed Access | Times Cited: 5
Ömer Dağıstanlı, Hasan Erbay, Hakan Kör, et al.
Neural Computing and Applications (2022) Vol. 35, Iss. 7, pp. 5575-5586
Closed Access | Times Cited: 5
An Enhanced Anti-Phishing Technique for Social Media Users: A Multilayer Q-Learning Approach
Asif Irshad Khan, Bhuvan Unhelkar
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access
Asif Irshad Khan, Bhuvan Unhelkar
International Journal of Advanced Computer Science and Applications (2024) Vol. 15, Iss. 1
Open Access
A vision transformer approach for fusarium wilt of chickpea classification
Hasan Erbay, Tolga Hayıt
Multimedia Tools and Applications (2024)
Closed Access
Hasan Erbay, Tolga Hayıt
Multimedia Tools and Applications (2024)
Closed Access
SMS Spam Detection System Based on Deep Learning Architectures for Turkish and English Messages
Hakan Can Altunay, Zafer Albayrak
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11804-11804
Open Access
Hakan Can Altunay, Zafer Albayrak
Applied Sciences (2024) Vol. 14, Iss. 24, pp. 11804-11804
Open Access
Improved Spam Detection Through LSTM- Based Approach
Chilukuri Lekhya Sri, D. Dhana Lakshmi, K. Ravali, et al.
(2024), pp. 1-6
Closed Access
Chilukuri Lekhya Sri, D. Dhana Lakshmi, K. Ravali, et al.
(2024), pp. 1-6
Closed Access
Adversarial dual decision-based model for event-related opinion sentence recognition
Yan Xiang, Yuan Qin, Zhengtao Yu, et al.
Multimedia Tools and Applications (2024)
Closed Access
Yan Xiang, Yuan Qin, Zhengtao Yu, et al.
Multimedia Tools and Applications (2024)
Closed Access
Octave convolutional multi-head capsule nutcracker network with oppositional Kepler algorithm based spam email detection
Ankur Ratmele, Ritesh Dhanare, Smita Athanere Parte
Wireless Networks (2024)
Closed Access
Ankur Ratmele, Ritesh Dhanare, Smita Athanere Parte
Wireless Networks (2024)
Closed Access
Youtube Comment Spam Detection
P. Nagaraj, K. Muthamil Sudar, P Thrived, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023) Vol. 4, pp. 1-6
Closed Access | Times Cited: 1
P. Nagaraj, K. Muthamil Sudar, P Thrived, et al.
2022 International Conference on Computer Communication and Informatics (ICCCI) (2023) Vol. 4, pp. 1-6
Closed Access | Times Cited: 1
Topic Classification Based on Scientific Article Structure: A Case Study at Can Tho University Journal of Science
Hải Thanh Nguyễn, Tuyet Ngoc Huynh, Anh Duy Le, et al.
Communications in computer and information science (2023), pp. 208-215
Closed Access | Times Cited: 1
Hải Thanh Nguyễn, Tuyet Ngoc Huynh, Anh Duy Le, et al.
Communications in computer and information science (2023), pp. 208-215
Closed Access | Times Cited: 1
A Hybrid Model with New Word Weighting for Fast Filtering Spam Short Texts
Tian Xia, Xuemin Chen, Jiacun Wang, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8975-8975
Open Access | Times Cited: 1
Tian Xia, Xuemin Chen, Jiacun Wang, et al.
Sensors (2023) Vol. 23, Iss. 21, pp. 8975-8975
Open Access | Times Cited: 1
Uncovering Spam in Twitter: A Machine Learning Approach
Abdul Majid Soomro, Awad Bin Naeem, Susama Bagchi, et al.
2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) (2023), pp. 993-998
Closed Access
Abdul Majid Soomro, Awad Bin Naeem, Susama Bagchi, et al.
2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) (2023), pp. 993-998
Closed Access